MAECProject / cuckooLinks
Cuckoo Sandbox is an automated dynamic malware analysis system
☆10Updated 4 years ago
Alternatives and similar repositories for cuckoo
Users that are interested in cuckoo are comparing it to the libraries listed below
Sorting:
- Simple SYSLOG client in Go☆22Updated 2 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- ☆35Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last month
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆23Updated 6 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- ☆47Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- ☆12Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago